Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013
…
5 pages
1 file
In these days as multimedia data transferred over insecure channel, it becomes an important issue to encrypt image with a suitable image encryption algorithms. An image encryption is different from text due to large processing, pixels definition, time to encrypt and size. This is also a different approach due to different type of attacks possible on text and image data. In this paper we study some encryption technique on the basis of their classification. Major technique are classified in different categories are, (I) Pixel Position permutation based algorithm, (II) value transformation based algorithm and (III) visual transformation based algorithm. We aim to frame this paper as literature survey of these classifications.
… Journal of Emerging Technology and Advanced …, 2011
– This paper focuses mainly on the different kinds of image encryption and decryption techniques. In addition focuses on image encryption techniques, As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are various techniques which are discovered from time to time to encrypt the images to make images more secure. This paper presents a survey of over 25 research papers dealing with image encryption techniques scrambled the pixels of the image and decrease the correlation among the pixels, so that we will get lower correlation among the pixel and get the encrypted image. In this paper a Survey of Different Image Encryption and encryption techniques that are existing is given. It additionally focuses on the functionality of Image encryption and decryption techniques.
IJSRD, 2013
Security is an important issue in digital data transmission and storage. The security can be provided by image encryption. Encryption is one of the ways to provide high security when images are transmitted over the network. Image encryption techniques scrambled the pixels of the image and decrease the correlation among the pixels, so that we will get lower correlation among the pixel and get the encrypted image which is hard to understand. There are so many different image encryption techniques available to protect confidential image data from unauthorized access. Image encryption techniques which provide transmission of digital images in more secure way. Encryptions algorithms that are good for textual data may not be suitable for multimedia data because images contain large data. This paper present survey of various encryption methods with its advantages and disadvantages.
ijetae.com
In the present world when whole web is now coming on from text data to multimedia data, one of the major security concerns is the protection of this multimedia data. Image, which covers the highest percentage of the multimedia data, its protection is very important. This can be achieved by Image encryption. There are so many different techniques should be used to protect confidential image data from unauthorized access. In this paper, I had done the literature review on existing work which is used different techniques for image encryption from 1999 to 2011 and also given general introduction about cryptography and encryption.
In today's technical World people always concern with security of data before sending it over the internet. Security of data provides protection to data from unauthorized access. There is large no. of algorithms are available to secure the data. Cryptography plays a key role in data security. In modern cryptographic system encryption techniques are most widely in use. It provides security to data so that it can be used in confidential area like military, net banking, online transactions, medical, scientific etc. In this paper we mainly focus on some existing encryption techniques. Every technique comes with its good and bad features. It gives a brief review to researcher to choose a particular type of encryption scheme for some selected type of data so that it can be efficient and more secure.
At the present time, the protection of multimedia data has become a very important process which can be achieved by encryption. Basically, so many different techniques have been used to protect private image data from those who illegally try to have access. An efficient cryptographic scheme is one that has a space of a large key that resists brute force search time, less execution time complexity/ Highspeed and should be able to provide high confusion and diffusion for good security. In this paper, we survey an existing work which uses classic and modern techniques for image encryption, as the classic techniques used for text based on alphabets as basic elements while the modern techniques overcome this limitation by used mathematical algorithms for coding the information due to their digital system. A comparison has been conducted between several ciphers techniques (classic and modern) for images based on various parameters such as: Histogram, Correlation, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Peak Signal to Noise Ratio (PSNR), Entropy and Time complexity. An analysis of simulation result shows that chaotic encryption technique especially hyper-chaotic is the most efficient among the all.
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Zenodo (CERN European Organization for Nuclear Research), 2023
Nowadays while transferring and receiving the data like images, messages and other information, certain encryption methods are used to increase the security of that data. By using the encryption method, we can prevent the loss of data or can maintain the confidentiality or integrity of the data. In this paper we will study about the survey that we conducted about the encryption of image using different cryptographic algorithms.
Harran Üniversitesi Mühendislik Dergisi, 2022
In today's technology world, data security has a great importance. Because each data type has its own characteristics, there are various methods of providing this security. The main subject of this study is the security of image data which are more complex structures than text data. Using traditional encryption methods alone to ensure security in image data types can create security weaknesses. For this reason, nowadays, some traditional methods are combined with each other or different methods to encrypt image data. In this study, 131 articles were examined and image encryption methods were classified according to the traditional methods, some new methods or combinations of some methods, that they contain. Studies on both colored and gray level images have been handled together. Finally, the images used in the articles were compared with each other in many ways and the results were presented graphically.
IAENG International Journal of Computer …, 2008
Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. The original image was divided into blocks, which were rearranged into a transformed image using a transformation algorithm presented here, and then the transformed image was encrypted using the Blowfish algorithm. The results showed that the correlation between image elements was significantly decreased by using the proposed technique. The results also show that increasing the number of blocks by using smaller block sizes resulted in a lower correlation and higher entropy.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2021
Academic journal of Nawroz University, 2022
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
2008 First International Conference on Emerging Trends in Engineering and Technology, 2008
Journal of Systems and Software, 2001
International Journal of Electronic Security and Digital Forensics, 2019
International Journal of Computer Applications, 2014